answersLogoWhite

0


Best Answer

It depends on which part of the banking system you mean. It can be something as simple as shredding personal papers through using passwords and smart cards to access computer systems - to ensuring no single employee has the whole combination to the bank's safe.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What security protocols are used by banks?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What security protocols are predominantly used in Web based electronic commerce?

SET, SSL, and S-HTTP


What security protocols are predominantly used in Web-based electronic commerce?

§SET, SSL, and S-HTTP


What Ensures that the information is correct and that no unauthorized person or malicious software program has altered that data?

There are a variety of security protocols that are used for that purpose.


Is a set of standardized security protocols for encryption and authentication information?

IPsec


What services or protocols should be avoided in a network to increase security?

Telnet


Why might someone see better security when using a browser other internet explorer?

Internet Explorer does not have that kind of security protocols than Chrome. Chrome has established better protocols than others.


Identify the networktranspor layer protocols used for windows file sharing when the protocols are installed alone?

Identify the networktranspor layer protocols used for windows file sharing when the protocols are installed alone.


Which protocols are used in tetra mobile communication?

As per my knowledge, AT Command and TNP1 protocols are used in TETRA


How do banks safeguard money?

by security


The protocols used to encrypt account names and passwords are called?

Authentication Protocols


What function do protocols perform in network communication?

protocols used for network device.


Objective of security analysis?

The objective of a security analysis is to ensure your computer network is as secure as possible. A security analysis will help you find weaknesses in your system in order to develop your security protocols.